Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Critical flaw in unpatched Telnetd (CVE-2026-32746) enables unauthenticated route RCE over port 23

Arizona makes first criminal charge for “illegal gambling business”; legal troubles pile up for Karsi

Mistral bets on “building its own AI” to compete with OpenAI, the human presence in the enterprise

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Critical flaw in unpatched Telnetd (CVE-2026-32746) enables unauthenticated route RCE over port 23
Identity

Critical flaw in unpatched Telnetd (CVE-2026-32746) enables unauthenticated route RCE over port 23

By March 18, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 18, 2026Vulnerability/Data Protection

Cybersecurity researchers have uncovered a critical security flaw affecting the GNU InetUtils Telnet daemon (telnetd). This flaw could be exploited by an unauthenticated, remote attacker to execute arbitrary code with elevated privileges.

This vulnerability is tracked as CVE-2026-32746 and has a CVSS score of 9.8 out of 10.0. This is described as a case where an out-of-bounds write in the LINEMODE Set Local Character (SLC) suboption handler causes a buffer overflow, ultimately paving the way for code execution.

Israeli cybersecurity firm Dream, which discovered and reported the flaw on March 11, 2026, said the flaw affects all versions of the Telnet service implementation up to 2.7. A fix for this vulnerability is expected to be available by April 1, 2026.

“An unauthenticated, remote attacker could exploit this by sending a specially crafted message during the initial connection handshake, before the login prompt appears,” Dream said in the alert. “A successful exploit could allow remote code execution as root.”

“A single network connection to port 23 is sufficient to trigger this vulnerability; no credentials, user interaction, or special network location are required.”

According to Dream, the SLC handler handles option negotiation during the Telnet protocol handshake. However, because the vulnerability can be triggered before authentication, an attacker could weaponize the vulnerability immediately after establishing a connection by sending a specially crafted protocol message.

If telnetd is running with root privileges, a successful exploit could lead to a complete system compromise. This could open the door to a variety of post-exploitation actions, including deployment of persistent backdoors, data exfiltration, and lateral movement using the compromised host as a pivot point.

According to Adiel Sol, security researcher at Dream, “An unauthenticated attacker could trigger this vulnerability by connecting to port 23 and sending a crafted SLC suboption containing a large number of triplets.”

“No login is required. This bug occurs during option negotiation before the login prompt. An overflow can corrupt memory and turn into arbitrary writes. In practice, this could lead to remote code execution. Because telnetd typically runs as root (e.g., under inetd or xinetd), a successful exploit could give the attacker complete control of the system.”

In the absence of a fix, we recommend isolating Telnet access by disabling services when not needed, running telnetd without root privileges if necessary, and restricting access by blocking port 23 at the network perimeter and host-based firewall level.

This disclosure comes nearly two months after another critical security flaw was disclosed in GNU InetUtils telnetd (CVE-2026-24061, CVSS score: 9.8). This flaw could be exploited to gain root access to the target system. According to the U.S. Cybersecurity and Infrastructure Security Agency, the vulnerability has since been exploited in the wild.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleArizona makes first criminal charge for “illegal gambling business”; legal troubles pile up for Karsi

Related Posts

AI flaws in Amazon Bedrock, LangSmith, and SGLang enable data breaches and RCEs

March 17, 2026

LeakNet ransomware uses ClickFix and deploys Deno In-Memory Loader via hacked sites

March 17, 2026

AI is everywhere, but CISOs are still protecting it with yesterday’s skills and tools, study finds

March 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Critical flaw in unpatched Telnetd (CVE-2026-32746) enables unauthenticated route RCE over port 23

Arizona makes first criminal charge for “illegal gambling business”; legal troubles pile up for Karsi

Mistral bets on “building its own AI” to compete with OpenAI, the human presence in the enterprise

Why is Garry Tan’s Claude Code setting so loved and hated?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.